Update unit test
This commit is contained in:
parent
61f006e1b3
commit
10637f6f86
|
|
@ -3,7 +3,7 @@ from datetime import timedelta
|
||||||
from unittest.mock import patch
|
from unittest.mock import patch
|
||||||
|
|
||||||
import requests
|
import requests
|
||||||
from authlib.integrations.django_client import DjangoRemoteApp
|
from authlib.integrations.django_client import DjangoOAuth2App
|
||||||
from django.contrib.auth.models import AnonymousUser
|
from django.contrib.auth.models import AnonymousUser
|
||||||
from django.contrib.sessions.middleware import SessionMiddleware
|
from django.contrib.sessions.middleware import SessionMiddleware
|
||||||
from django.test import TestCase, RequestFactory
|
from django.test import TestCase, RequestFactory
|
||||||
|
|
@ -49,7 +49,7 @@ class LoginTests(TestCase):
|
||||||
|
|
||||||
return authorize(request)
|
return authorize(request)
|
||||||
|
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
||||||
def test_user_data_is_synced_on_login(self, user_mock, authorize_mock):
|
def test_user_data_is_synced_on_login(self, user_mock, authorize_mock):
|
||||||
|
|
||||||
|
|
@ -74,7 +74,7 @@ class LoginTests(TestCase):
|
||||||
self.assertTrue(self.user.is_authenticated)
|
self.assertTrue(self.user.is_authenticated)
|
||||||
|
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_TEACHERS_ORDERS)
|
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_TEACHERS_ORDERS)
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
||||||
def test_teacher_can_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
def test_teacher_can_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
||||||
response = self._login('/api/oauth/authorize?code=1234')
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
@ -101,7 +101,7 @@ class LoginTests(TestCase):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_STUDENT_ORDERS)
|
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_STUDENT_ORDERS)
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
||||||
def test_student_can_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
def test_student_can_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
||||||
|
|
||||||
|
|
@ -119,7 +119,7 @@ class LoginTests(TestCase):
|
||||||
self.assertTrue(self.user.is_authenticated)
|
self.assertTrue(self.user.is_authenticated)
|
||||||
|
|
||||||
@patch.object(HepClient, 'is_email_verified', return_value=False)
|
@patch.object(HepClient, 'is_email_verified', return_value=False)
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
||||||
def test_user_with_unconfirmed_email_cannot_login(self, user_mock, authorize_mock, verified_mock):
|
def test_user_with_unconfirmed_email_cannot_login(self, user_mock, authorize_mock, verified_mock):
|
||||||
response = self._login('/api/oauth/authorize?code=1234')
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
@ -129,7 +129,7 @@ class LoginTests(TestCase):
|
||||||
self.assertEqual(f'/{OAUTH_REDIRECT}?state={EMAIL_NOT_VERIFIED}', response.url)
|
self.assertEqual(f'/{OAUTH_REDIRECT}?state={EMAIL_NOT_VERIFIED}', response.url)
|
||||||
|
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
||||||
def test_user_can_login_without_license(self, me_mock, product_mock, verified_mock):
|
def test_user_can_login_without_license(self, me_mock, product_mock, verified_mock):
|
||||||
response = self._login('/api/oauth/authorize?code=1234')
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
@ -139,7 +139,7 @@ class LoginTests(TestCase):
|
||||||
self.assertTrue(self.user.is_authenticated)
|
self.assertTrue(self.user.is_authenticated)
|
||||||
|
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=ME_DATA)
|
||||||
def test_user_can_login_local_license_invalid(self, me_mock, product_mock, verified_mock):
|
def test_user_can_login_local_license_invalid(self, me_mock, product_mock, verified_mock):
|
||||||
now = timezone.now()
|
now = timezone.now()
|
||||||
|
|
@ -160,7 +160,7 @@ class LoginTests(TestCase):
|
||||||
self.assertEqual(response.url, f'/{OAUTH_REDIRECT}?state={UNKNOWN_ERROR}')
|
self.assertEqual(response.url, f'/{OAUTH_REDIRECT}?state={UNKNOWN_ERROR}')
|
||||||
|
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_TEACHERS_ORDERS)
|
@patch.object(HepClient, 'fetch_eorders', return_value=VALID_TEACHERS_ORDERS)
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
||||||
def new_user_is_created_in_system_after_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
def new_user_is_created_in_system_after_login_with_valid_license(self, user_mock, authorize_mock, orders_mock):
|
||||||
response = self._login('/api/oauth/authorize?code=1234')
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
@ -190,7 +190,7 @@ class LoginTests(TestCase):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
@patch.object(HepClient, 'fetch_eorders', return_value=[])
|
||||||
@patch.object(DjangoRemoteApp, 'authorize_access_token', return_value=TOKEN)
|
@patch.object(DjangoOAuth2App, 'authorize_access_token', return_value=TOKEN)
|
||||||
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
@patch.object(HepClient, 'user_details', return_value=NEW_ME_DATA)
|
||||||
def new_user_is_created_in_system_after_login(self, user_mock, authorize_mock, orders_mock):
|
def new_user_is_created_in_system_after_login(self, user_mock, authorize_mock, orders_mock):
|
||||||
response = self._login('/api/oauth/authorize?code=1234')
|
response = self._login('/api/oauth/authorize?code=1234')
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue